This site needs to use cookies to function correctly.

Please click the button to accept our cookies. Some may have been set already. Read about our cookies and how to manage them.

Allow Cookies

About Cookies

Cookies are files stored in your browser and are used by most websites to help personalise your web experience.

They enable this website to remember you, either for the duration of your visit using a Session Cookie or for repeat visits using a Persistent Cookie.

Some features on this site will not function if you do not allow cookies.

Our Cookies

We only use "First party cookies" that are set or read by this website.

We do not use "Third party cookies" where your information is passed to other websites, such as where advertising is targeted to you across the web based upon your browsing habits.

Managing Your Cookies

Most web browsers allow some control of most cookies through the browser settings.

To find out more about cookies, including how to see what cookies have been set and how to manage and delete them, visit www.allaboutcookies.org.


Close Up

Changing Core System shield settings

The Core System shield monitors the computer system structures and makes sure malware has not tampered with them. If it detects a suspicious file trying to make changes, it opens an alert and prompts you to block or allow the item. If it detects a known threat, it immediately blocks and quarantines the item before it causes damage to your computer or steals your information.

To change shield settings:

  1. Open the main interface.

  2. At the bottom left, click Settings.

    SettingsLink.png

  3. From the Settings dialog, click Core System Shield.

    SettingsCoreSystemShield.png

  4. If you want to change a setting, select its checkbox to disable it (uncheck the box) or activate it (check the box). When you're done, click the Save All button.

Note: We recommend that you keep Webroot's default settings. If you make changes and decide you want to return to the recommended settings, click the Reset to Defaults button.

The settings are described in the table below.

Core System shield settings

Assess system modifications before they are allowed to take place

Intercepts any activity that attempts to make system changes, such as a new service installation.

Detect and repair broken system components

Locates corrupted components, such as a broken Layered Service Provider (LSP) chain or a virus-infected file, then restores the component or file to its original state.

Prevent untrusted programs from modifying kernel memory

Stops unclassified programs from changing the kernel memory. The kernel is the central component of most computer operating systems. It acts as a bridge between applications and data processing done at the hardware level.

Prevent untrusted programs from modifying system processes

Stops unclassified programs from changing the system processes.

Verify the integrity of the LSP chain and other system structures

Monitors the Layered Service Provider (LSP) chain and other system structures to make sure malware does not corrupt them.

Prevent any program from modifying the HOSTS file

Stops spyware from attempting to add or change the IP address for a website in the hosts file. It opens an alert where you can block or allow the changes. The hosts file is a Windows file that helps direct your computer to a website using Internet Protocol (IP) addresses.



CNTOPT:11